This glossary provides definitions for many of the terms you can see while using the installation documentation. Although the majority of terms are related to the installation environment, you also will find other common terms related to the applications that are used to set up a system for general use after a Full Installation.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Special Characters
See root
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
A
A journaled, local file system that provides higher availability and greater flexibility than traditional UNIX file systems. Using transaction journaling, AdvFS recovers file system integrity in seconds, rather than minutes, after an unexpected restart such as a power failure.
AdvFS journaling also provides increased file system integrity. AdvFS provides greater flexibility by allowing file sets (file systems) to share a single storage pool and enabling hard and soft file set quotas in addition to user and group quotas.
1. To store programs, data files, text files, and other types of files for safekeeping. For instance, the Update Installation Cleanup application provides the option to archive the backup files created by an Update Installation.
2. A repository for such files.
See layered product
The method used to define data in a configuration description file (CDF). A CDF file is organized as groupings of attribute-value pairs. An equal sign ( = ) separates each attribute and its associated value.
See also CDF (Configuration Description File)
The amount of swap space not reserved by processes. In contrast, free swap space is everything except for the space actually in use. Available swap space is smaller than free swap space because it takes into account both the space that is in use and any reservations that processes may have made. Free swap space does not take reservations into account.
See also swap space
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
The operating system without any additional third party or layered products installed. All software subsets that are located on the first CD-ROM comprise the base operating system.
A distributed database name lookup service that lets you distribute the host database network wide. Also known as Domain Name Service (DNS).
See also BIND client, BIND server
A computer that queries a BIND server for host name and host address information, interprets the responses, and passes the information to requesting applications.
See also BIND (Berkeley Internet Name Domain)
A computer that is an authoritative source for information about one or more zones. The BIND server either maintains the master copy of the host's database for the zone or obtains the information required to serve the hosts database from another server.
See also BIND (Berkeley Internet Name Domain)
A storage device that supports directory memory access (DMA) rather than character input/output.
A device special file that provides access to an input or output device and is capable of supporting a file system.
See also device special file
The time when the operating system is initializing. In the case of a cold boot, the hardware also is initialized.
Having the ability to load and initialize the operating system
A protocol that provides a framework for passing configuration information to hosts on a TCP/IP network. The bootp protocol allows a client machine to discover its own IP address, the address of a server host, and the name of a file to be loaded into memory and executed. The bootstrap operation can be thought of as consisting of two phases. The first phase is address determination and bootfile selection and the second phase is file transfer.
The command interpreter and interpreted programming language originally developed by Steve Bourne.
See also shell
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
A command interpreter and interpreted programming language developed at the University of California at Berkeley; so named because many of its constructs resemble the equivalent C language constructs.
See also shell
A graphical user interface for interacting with the operating system. The CDE interface was jointly developed and is based on industry standards, including the X Consortium's X Window System and the Open Software Foundation's Motif interface.
On systems with graphics capabilities, a centrally located window on the CDE desktop, which contains icons for accessing system management applications and utilities. The Front Panel occupies all desktop workspaces.
A data file that is used to clone systems.
Two separate CDFs
store the installation and configuration characteristics of an installed and
configured system.
Installation information is stored in an
install.cdf
file, which is created automatically whenever a Full Installation
is performed.
Configuration information is stored in a
config.cdf
file, which is created manually using the
sysman -clone
-save
command.
Both of these files are located in the
/var/adm/smlogs
directory by default.
See also installation cloning, configuration cloning
A data storage or transfer device that manipulates data in increments of a single character; for example, a terminal.
A file through which processes can access either a character-stream oriented I/O interface or an unstructured (raw) device, such as a communication line or an unbuffered magnetic tape or disk.
A sum of bits or digits used primarily for verification purposes, summed according to an arbitrary set of rules. The checksum verifies the integrity of data.
A computer system that uses resources provided by another computer system called a server.
A process that uses the installation or configuration characteristics in a configuration description file (CDF) generated from one system to create an exact replica on another system.
See also CDF (Configuration Description File)
A loosely coupled collection of servers that share storage and other resources that make applications and data highly available. A cluster consists of communications media, member systems, peripheral devices, and applications. The systems communicate over a high-performance interconnect.
See also cluster member
The basic computing resource in a cluster. A member system physically must be connected to a cluster interconnect and at least one shared SCSI bus. The connection manager dynamically determines cluster membership based on communications among cluster members.
A software subset that is required for the proper function of the operating system only when certain hardware or software is detected during the installation procedure which makes the software mandatory.
See also mandatory software subset
1. The machines, devices, and programs that make up a data processing system or network.
2. The act of making a subsystem, or a set of subsystems, or services available for use by a running operating system.
3. The set of configured subsystems in an operating system.
The process that duplicates the configuration from a previously configured system onto one or more target systems, eliminating the need to perform the configuration tasks as a separate operation. Configuration information such as network setup and services, mail setup, printer setup, and internet access can be cloned from one system to another.
See also installation cloning, CDF (Configuration Description File)
When the system is halted, the operating system is no longer
running, and the console subsystem is started.
This state is also known as
console mode and is recognizable by the console mode prompt, which is represented
by three right arrow characters (>>>
).
The console mode
prompt is sometimes called
triple arrows.
A file that is created when an application terminates abnormally
or the system crashes.
A
core
file may be useful to debug
a problem with an application or system that crashed, but otherwise,
core
files should be deleted because they consume a large amount
of disk space.
A
core
file is created in the directory
from which the application was invoked.
See also crash file
A file that is created when the system crashes.
System crashes
may be caused by a hardware malfunction, a kernel failure, a software error,
or a variety of other reasons.
The
core
file created
by the crash may be useful to debug why the system crashed, but otherwise,
core files should be deleted because they consume a large amount of disk space.
Additional crash data is stored in the
/var/adm/crash
directory.
A disk partition table that differs from the recommended partition table. Systems that are shipped with factory installed software (FIS) typically use a custom partition table because of the many layered products that are installed in addition to the base operating system. Customizing a partition table lets you divide a disk in a fashion best suited to your needs.
See also partition table, recommended partition table
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
D
A standard defined by The Open Group for distributed computing that defines a uniform set of services that share certain global properties for common naming, security, time synchronization, system availability, access to data, and system management. DCE enables applications and data on heterogeneous systems to work together.
Any value that is set automatically by an application or process.
1. The partition used by a system as the default boot partition.
2. The physical portion of a disk that is usually assigned by the installation process to hold a specific file system.
See also partition
When the
/
( root
)
and
/usr
file systems and a single swap area,
swap1
, are installed on the same disk in the
a
,
g
, and
b
disk partitions, respectively.
See also file system layout
The disk partitions that are defined in the
/etc/disktab
file or, in the absence of an entry in that file, the disk driver
itself.
The default partition table varies with disk type because it depends
upon the size of the disk itself.
The
disklabel -p
command
is used to view a disk's default partition table.
Every supported disk has
a preset default partition table, but it is not recommended to use it during
a Full Installation.
See also partition table
A subset that requires the presence of other subsets in order
to function properly.
Dependencies between subsets are evaluated by a subset's
software control program (SCP), which is controlled by the
setld
command.
See also subset
1. The general name for any peripheral hardware connected to the processor that is capable of receiving, storing, or transmitting data. For example, card readers, line printers, and terminals are record-oriented devices. Magnetic tape devices and disks are examples of mass storage devices. Terminal line interfaces and interprocessor links are examples of communication devices.
2.
The files in the
/dev
directory that are used to access physical devices are themselves
sometimes called devices.
The name or address used to access a physical disk.
Device
names are located in the
/dev
directory.
A file used by processes to access hardware devices. For example, a printer is accessed through a device special file.
See also block special file, character special file
The disk information, usually located in sector 0 (zero), that includes the disk geometry and partition divisions. This information is used by the system disk driver and the boot program to identify a drive, and to determine how to program a drive and where to find the file systems.
See also partition
See partition
The media that is used to make software kits available for installation. Typical media types on which to distribute software include CD-ROMs, RIS servers, or locally mounted disks.
A service provided whereby a server computer system maintains
the
/
( root
),
/usr
, and
/var
file systems for client computer
systems connected to the server through a local area network (LAN).
A reserved disk area that physically is connected to a DMS server and that contains multiple copies of the DMS root area, one for each registered client.
A computer system whose system disk area physically is connected to a DMS server rather than to the client itself and is accessed across the network by the client.
1.
Any single element of
a domain name.
Using
host1.nyc.bigcorp.com
as an example:
nyc.bigcorp.com
is the domain and
host1
is the unique host name.
2.
Any qualified portion
of a domain name.
Qualified means that it is fully specified all the way to
the root domain.
Using
host1.nyc.bigcorp.com
as an example:
nyc.bigcorp.com
,
bigcorp.com
, and
.com
are qualified domains.
3.
The domain, and all
the subdomains beneath it, down to the leaf nodes of the domain space tree.
Using
nyc.bigcorp.com
as an example:
nyc.bigcorp.com
is the name of the domain, and the domain encompasses all the hosts
located in
nyc
(New York City).
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
E
A line-oriented program for modifying the contents of text
files.
The program operates by accepting commands from the user.
For example,
issuing the command
s/Unix/UNIX/g
substitutes each instance
of the string
Unix
on the current line with the string
UNIX
.
A program for modifying the contents of text files.
Full-screen
editors, such as
vi,
use video display terminals to display
several lines of the file being manipulated; they allow the user to move the
cursor to a specific location and change the text there.
Line editors, such
as
ed,
work on a line-by-line basis.
Stream editors, such
as
sed,
work by applying commands from a previously prepared
list (called a script) instead of by accepting commands from the user.
A text editor developed by the Free Software Foundation that is available for all UNIX systems, although it is not a standard part of Berkeley UNIX or System V. It is included with this UNIX operating system.
A line-oriented program for modifying the contents of text
files.
The
ex
editor is an extended version of the
ed
editor.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
F
The hierarchical structure of directories and files on a physical
or logical mass storage device.
The hierarchy starts with the
/
( root
) directory.
In this UNIX
operating system, the standard UNIX file systems are
/
,
/usr
, and
/var
.
The
/var
file
system optionally can be created as an area under the
/usr
file system.
The location of the basic UNIX file systems and swap areas:
/
( root
),
/usr
,
/var
,
swap1
, and
swap2
on
one or more disks.
Defines how a file system is structured and managed. The Full Installation process offers the Advanced File System (AdvFS) and UNIX File System (UFS) as supported file system types.
See also AdvFS (Advanced File System), UFS (UNIX File System)
When the Update Installation process finds a file type that is different from the file type as it was shipped in the previous version of the operating system. A file type conflict occurs when the file type of a file, directory, symbolic link, block device, or pipe was modified from the file type originally shipped. The Update Installation cannot install the new file type without overwriting the modified file type. This feature preserves the integrity of the software to be updated.
The software stored in silicon (for example, ROM or EPROM) on a system's CPU board. Firmware is also known as console code. Firmware is the first software that runs when a system is turned on, and it directly controls all hardware. Each hardware platform uses a different set of firmware. The firmware on a platform is the same regardless of the operating system installed on the platform. Thus, firmware is platform dependent, but is not operating system independent.
A process that preinstalls the operating system at the factory before a system is shipped from the manufacturing facility. Typically, FIS systems are installed with all mandatory and all optional operating system software and a variety of layered products. Included in the box with the preinstalled system is the Factory Installed Software Information Sheet, which describes the software products that have been installed and the disks and disk partitions that were used for the file system layout.
The process by which a brand new version of the operating system is installed onto a system. A Full Installation creates new file systems and swap space and overwrites existing system and user-created files on the disk partitions where the new file systems and swap spaces are to be installed. After the Full Installation, the system must be configured for general use.
A host name containing one or more labels separated by a period
that uniquely defines a computer.
A label is a string which begins with a
letter and contains letters, digits, and hyphens and ends with a letter or
a digit.
A label can have between 2 and 63 characters, inclusive.
A fully
qualified host name can have a maximum of 254 characters.
For example,
host1.nyc.bigcorp.com
is a fully qualified host name.
See also domain
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
The kernel image that includes kernel support for all system
types, devices, and software options.
The generic kernel file,
/genvmunix
, can be booted if the tailored kernel,
/vmunix
, is damaged.
See also tailored kernel
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
H
A type of system shut down that stops the processor but does
not reboot the system.
When the system is halted, the operating system is
no longer running, and the console subsystem is started.
This state is also
known as console mode and is recognizable by the console mode prompt, which
is represented by three right arrow characters (>>>
).
A
system can be halted by using the
shutdown -h now
command.
1. The primary or controlling computer in a communications network.
2. Any computer system attached to a network.
The name given to a computer. Lowercase and uppercase letters (a-z and A-Z), numbers (0-9), periods, and dashes are permitted in host names. Valid host names contain from 2 to 63 characters with the first character being a letter.
The coding (markup) inserted in a file intended for display
on a World Wide Web browser that tells the browser how to display the words
on a web page.
The markup is done with
tags, which are
command words enclosed in angle brackets.
For example, the tag
<P>
creates a new paragraph; the tag
<TABLE>
begins
the formatting of a table.
Although the World Wide Web Consortium (W3C) promotes
the standardization of HTML, both Netscape and Microsoft browsers currently
implement some features differently and provide nonstandard extensions.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
The abbreviation for
internationalization.
Worldwide Language Support (WLS) software is installed in the
/usr/i18n
directory, which can be created as its own file system or can
be created as a symbolic link to another file system.
See also WLS (Worldwide Language Support)
The command issued as the final step in the boot procedure.
The
init
command initializes the system by creating and
controlling processes.
The processes run by the
init
command at each run level are defined in the
/etc/inittab
file.
The root process created by the system that performs system administration tasks, such as spawning login processes and handling the orderly shutdown from multiuser to single-user mode.
The internal structure that describes the individual files in the operating system. There is one inode for each file. An inode contains the node, type, owner, and location of a file. A table of inodes is stored in strategic locations of a file system.
A number specifying a particular inode file in the file system.
The process that duplicates the installation characteristics (that is, disk selection, file system layout, and installed software) from an installed system onto one or more systems with the same or similar hardware configuration. Installation cloning is performed directly from a Full Installation.
See also CDF (Configuration Description File)
A unique 32-bit number that identifies a host's connection to an internet network. An internet address consists of a network number and a host number.
The network layer protocol for the Internet protocol suite that provides the basis for the connectionless, best-effort packet delivery service. IP includes the Internet Control Message Protocol (ICMP) as an integral part. The Internet protocol suite is referred to as TCP/IP because IP is one of the two most fundamental protocols.
A 32-bit quantity used to represent a point of attachment in an Internet. Periods (.) delineate each portion of the address.
See also IP (Internet Protocol)
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
The core part of the operating system that controls processes, system scheduling, memory management, input and output services, device management, network communications, and the organization of the file systems.
A command interpreter and interpreted programming language
developed by David Korn.
The Korn shell (ksh
) is semantically
an extended version of the Bourne shell, with constructs and commands to implement
enhanced features, including job control and command history recall.
The POSIX
shell is a superset of the Korn shell.
See also shell
The command that invokes the Korn shell; the name of the executable file that is the shell.
See also Korn shell, shell
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
A group of two or more computer systems (hosts) connected by a transmission medium, such as an Ethernet cable, token ring, or FDDI. Each host is connected to the transmission medium by a hardware interface. A LAN is a data communications network that spans a physically limited area, such as a single office building. It usually is owned by the organization it services and provides high-bandwidth communication over inexpensive media.
See also network
A software product that is compatible with the operating
system but is not part of the base operating system.
A layered software product
is installed, or layered, along with the operating system.
Layered software
products are often shipped on the Associated Products compact discs (CD-ROMs)
that can accompany a new release of the operating system.
In most cases, layered
software products are installed from the SysMan Menu or by using the
setld
command.
See also base operating system, setld, SysMan Menu
To begin using a computer system, usually by entering a login name and password to gain access to and communicate with the operating system as an authorized user.
LSM is an integrated, host-based disk storage management tool that protects against data loss, improves disk input/output performance, and customizes the disk configuration. LSM builds virtual disks, called volumes, on top of UNIX disks. A volume is a special device that contains data used by file systems, databases, or other applications. LSM transparently places a volume between a physical disk and an application, which then operates on the volume rather than on the physical disk.
The disk partition that contains LSM configuration information for the entire system. Multiple private regions on multiple disks provide backup functionality in the unlikely event of a disk failure. The LSM private region requires 2 MB of disk space.
See also LSM (Logical Storage Manager)
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
That portion of the kernel that is required for the proper operation of the base operating system.
A portion of software that is the minimum required to install and run a software product.
A program used by the Update Installation process to automatically merge new functionality from the new version of the operating system into an existing customized file.
See also protected system file, .PreMRG file
A command that attaches a file system to an existing directory to make the file system available for use.
See also unmount
A directory that is the name of a mounted file system.
A system with two or more processors sharing common physical memory.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
N
The service provided to client processes for identifying peer processes for communications purposes.
Two or more computing systems that are linked for the purpose of exchanging information and sharing resources.
A system file with this prefix allows a new version of a protected system file be delivered to the system during an Update Installation without overwriting the existing, and possibly customized version of the file.
See also protected system file, .proto.. file
A service that allows a system (the server) to make file systems available across a network for mounting by other systems (clients). When a client mounts an NFS file system, the client's users see the file system as if it were local to the client.
Refers to a file system that is mounted over a network by NFS rather than being physically connected (local) to the system on which it is mounted.
See also NFS (Network File System)
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Files that were shipped in a previous version of the operating system that are no longer shipped with the current version of the operating system. Removing obsolete files does no harm to the operating system and helps save disk space.
A portion of the kernel that is not required for the proper operation of the mandatory portions of the base operating system but may be required for the proper operation of optional portions of the operating system or layered software products. Optional kernel components may also provide some additional functionality required by a user (for instance, the Packet Filter Driver).
See also base operating system, kernel, layered product
A variety of software applications that can be installed to enhance the base operating system but are not required for the proper operation of the operating system. A prime example of optional software subsets are the UNIX reference pages; they are not required, but are a useful addition.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
P
A fixed-size unit of physical memory.
The physical portions of a disk that are named
a
through
h
.
Disks are divided into sections that
are then assigned to hold various file systems.
By convention, the
/
( root
) file system is always
located on the first partition, named
a.
The
/usr
file system is on a different partition, often the
g
partition.
The
c
partition usually represents
the entire disk.
Each partition may differ in size and can overlap other partitions.
Two overlapping partitions cannot be used at the same time.
Disks can have
up to eight partitions.
Partitions are sometimes known as
slices.
The component of a disk label that specifies how a physical disk is divided or partitioned.
A string of characters that in conjunction with other information, such as the login name, uniquely confirms a user's identity to the system. Passwords should contain a combination of upper and lower case letters, numbers, and special characters and must be a minimum of six to a maximum of 16 characters in length.
An ordered list of the directories in which the shell searches for the executable files named by commands that are not entered with a pathname and are not shell built-in commands.
The name of a file, concatenated onto a list of the directories
through which access to that file is achieved; hence, the complete name of
the file.
Absolute pathnames begin at the root directory and are written with
an initial slash (for example,
/usr/users/rolf/myfile.txt
).
Relative pathnames begin at the user's working directory and are written without
the initial slash (for example,
rolf/myfile.txt
).
The registered trademark for a language developed by Adobe Systems, Inc., for specifying the formatting of typeset documents or displays. An encapsulated PostScript file is a file that follows a standard for embedding PostScript files into other PostScript files.
A backup copy of a protected system file as it existed before
an Update Installation.
These files are appended with a
.PreMRG
extension.
If any system file customizations were not successfully merged,
refer to the
*.PreMRG
version of the file to include those
customizations in the postmerged file on the updated system.
See also protected system file
A backup copy of an unprotected customized file.
Before an
Update Installation takes place, unprotected system files that are found to
have been customized are copied and saved to the same file name with a
.PreUPD
extension.
If you have customized these files in any way,
you must manually add the customizations into the new version of the system
file when the Update Installation is complete.
See also unprotected system file
A customized system file whose customizations are automatically
merged into the new version of the file on the updated system.
A merge is
performed only when the file has been previously customized by the user or
the file has been modified by Compaq.
The Update Installation process creates
a backup
*.PreMRG
file for reference purposes in case of
a merge failure.
Protected system files are system files that are expected
to be customized, for example,
/etc/passwd
and
/etc/host
.
See also .PreMRG file
A file that is modified to deliver site-wide customizations
of system files to DMS client systems.
Performing this customization before
registering clients to the DMS environment reduces the amount of customization
required at each client.
There are several files with
.proto..
extensions located in the DMS environment
/var/adm/dms/dmsN.alpha
in the
/etc
,
/bin
,
/var/adm/X11
, and
/
directories that can be modified.
See also DMS (Dataless Management Services)
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Q
A system management application that lets you configure basic
licensing, networking, printing, and mail services.
The Quick Setup application
is accessed from the System Setup checklist by entering
/usr/sbin/checklist
on the command line.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
R
Brings the system down to console mode and restarts the operating system.
The way a disk is partitioned by the Full Installation process when the recommended file system layout is used. The recommended partition table is designed to hold the entire operating system and allow room on the disk for some additional software as well as enough extra space for future Update Installations. For a typical single disk installation, the recommended partition table is:
The
/
( root
)
file system is 128 MB on the
a
partition.
The first swap area,
swap1
, is 128 MB on
the
b
partition.
The
usr
file system is 745 MB on the
g
partition.
The
/var
file system is located
in
/usr
.
See also default file system layout, partition table
One of a collection of files containing documentation on all commands, system calls, library routines, and so forth. Reference pages are often called manual pages or man pages.
An application for installing software kits across a network
instead of using locally mounted distribution media.
If the RIS software subset
is installed, the RIS application is invoked by entering
/usr/sbin/ris
.
See also network, RIS (Remote Installation Services)
A reserved disk area physically connected to a RIS server, containing one or more installable software kits.
See also RIS (Remote Installation Services)
A computer system that has permission to install software across the network by accessing kits stored in the server's RIS area. Client systems are registered on the RIS server to software kits through the use of the RIS application.
See also RIS (Remote Installation Services)
A computer system that serves other computers by providing software kits for them to install. The software is stored on disks belonging to the server and is accessed across the network by the RIS clients.
See also RIS (Remote Installation Services)
1. The login name for the superuser (system administrator).
See also superuser
2.
The name applied to
the topmost directory in the UNIX system's tree-like file structure; hence,
the beginning of an absolute pathname.
The root directory is represented in
pathnames by an initial slash (/
); a reference to the root
directory itself consists of a single slash.
See root
The topmost file system under which all other file systems are mounted. The root file system contains the operating system files that get the rest of the system running.
See root
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
1. A nonbinary program that is interpreted and executed by a specified shell.
2.
In the
sed
editor, a list of editing commands to be applied to the input file.
An industry-standard bus for small systems such as personal computers, small multiuser systems, or workstations. SCSI-based devices can be configured in a series with multiple devices on the same bus.
A computer system that provides software or services to one or more other computers called clients.
See also client
A command used for installing, managing, and removing software subsets on a system that is already running the operating system.
See also subset
The command that invokes either the Bourne shell.
A program that interprets commands entered by the user, invoking programs and calling for system resources as needed.
See also Bourne shell, C shell, Korn shell
An operating system mode that prohibits user logins, stops system services and daemons (for networking and graphical windowing environments), stops any running processes, and unmounts file systems.
A command that substitutes another user's login for that of the user who invoked the command, logging in the invoking user under the substituted login. The invoking user must know the login password for the user whose login is being substituted. If no other user's login is specified, the command substitutes the root login.
A software kit module that is installed or removed with the
setld
command.
A subset usually consists of a collection
of related files, such as an application and its support files.
See also setld
The condition in which a given subset requires the presence,
or lack thereof, of other subsets in order to function properly.
Dependencies
between subsets is evaluated by a subset control program (SCP) under control
of the
setld
command.
A user possessing privileges to override the normal restrictions
on file access, process control, and so forth.
A user who possesses these
privileges becomes a superuser by issuing the
su
command,
or by logging into the system as the user
root
.
Disk space used to hold modified memory from an idle or low priority process in order to reclaim the physical memory that the process is using.
A file that contains the pathname of another file or directory and acts as a pointer to that file or directory. The symbolic link can occur within the same file system or across file systems; also called a soft link or sym link.
A menu of system management tasks organized in a tree-like
hierarchy with branches of general functionality and leaves for actual tasks.
Selecting a leaf opens a dialog for performing the task.
Depending on the
user's display device, the SysMan Menu provides either a graphical or text-based
interface.
The SysMan Menu is invoked from the command line by entering
/usr/sbin/sysman
or from the CDE Application Manager if your system
is running the CDE desktop.
The disk containing the
/
( root
) file system is sometimes known as the system disk.
A file that is resident on a system after an installation, which contains information that is important for the proper operation of the operating system.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
The kernel image that is created for a system, which includes
specific support for the hardware and software options installed on the system.
A tailored kernel is automatically built for the system at the end of the
installation process by the
/usr/sbin/doconfig
program,
and includes mandatory only, all, or customized kernel components as part
of the tailored kernel build.
See also kernel
A command that makes portable copies of files for archiving
or transfer to another system.
By default, the
tar
command
writes its archive files on the system's primary magnetic tape unit.
In the cloning process, the system that is to be cloned from another system.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
The standard file system type that is characterized by a hierarchical structure, the ability to create and delete files, dynamic growth of files, protection of file data, and the treatment of peripheral devices.
See also AdvFS (Advanced File System), file system
An option that is offered during a Full Installation
as a way to access the standard UNIX command line interface.
Its primary
purpose is to provide a way to perform disk and file system maintenance before
or during a Full Installation.
The UNIX shell provides a way to access all
UNIX commands that help you recover from serious problems such as
/
( root
) file system corruption
and enables you to perform general file system and disk maintenance tasks.
The process that announces to the system that a file system
previously mounted on a specified directory is to be removed.
Only the person
who mounted the particular file system or a superuser can unmount it.
A file
system is unmounted with the
umount
command.
See also mount
A customized system file, usually binary, whose customizations
are not merged automatically into the new version of the file on the updated
system.
Customizations are preserved in a file with a
*.PreUPD
extension.
If unprotected system files are altered in any way, customizations
must be merged manually into the new version of the system file when the Update
Installation is complete by using the
*.PreUPD
version
as a guide.
Unprotected system files are system files that are not expected
to be customized by a user, for example,
/usr/bin/X11/netscape
.
See also .PreUPD file
Updates a system running a previous version of the operating system to a more recent released version of the operating system. An Update Installation preserves disk partitions, file systems, file customizations, network and print environment, user accounts, user created files, and any other system setup that may have been done on the system.
The address of a file or other resource accessible on the
Internet.
The type of file or resource depends on the Internet application
protocol.
For example, using the HyperText Transfer Protocol (HTTP), the file
can be an HTML page, an image file, or a program such as a CGI application
or Java applet.
Such an address would look like this:
http://www.unix.digital.com
, which is the URL for the Compaq UNIX Web site.
A file that is searched for and executed during a Full or Update Installation. User-supplied files can be used to extend the installation process by applying customizations either before, during, or after the installation. The file can contain scripts, executables, or programs. The Full Installation and Update Installation processes always look for these files, and if the files are properly named and are put in the right location, they are executed when found.
A file system in which some components of the operating system
and applications are stored.
Users' home directories are sometimes also located
in a subdirectory of
/usr
.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
V
The number assigned to a particular release of the base operating system or to layered software products.
See also base operating system, layered product
A full-screen text editor.
The
vi
editor
is a modal editor.
In command mode, it accepts commands for cursor movement,
text deletion, and so forth.
To insert text into the file, the user gives
the editor a command that places the editor in input mode, and all keystrokes
thereafter are interpreted as input data until the Escape key is pressed.
Click letter for quick access: [Special Characters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
The set of software subsets that provide support for various native languages and countries. Installing WLS software subsets enables software developers to develop internationalized software and lets users work in their native language.